[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Formatting a data-aware...

Posted on 1998-03-08
3
Medium Priority
?
141 Views
Last Modified: 2010-04-06
I'm using paradox 7.0 from Database Desktop, Delphi 3 and W95....

How is the correct way to format one DBedit field to accept fone number for example....
in the application or in the Database desktop... If someone give-me the steps....

Thanks
0
Comment
Question by:sergio_2001
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
julio011597 earned 20 total points
ID: 1360264
In your application:double-click on the TTable component to create (and edit) Field components; select the incriminated field and have a look for the "EditMask"/"DisplayFormat" properties.

Regards.
0
 

Author Comment

by:sergio_2001
ID: 1360265
Julio,

I suppose your answer is what I need but I need to test this....


Regards....
0
 
LVL 5

Expert Comment

by:julio011597
ID: 1360266
Right! :)
0

Featured Post

Upgrade your Question Security!

Add Premium security features to your question to ensure its privacy or anonymity. Learn more about your ability to control Question Security today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question